slide1 n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Securing Bermuda businesses from the storm of cybersecurity threats - John Christly | Secure Bermuda - 2016 PowerPoint Presentation
Download Presentation
Securing Bermuda businesses from the storm of cybersecurity threats - John Christly | Secure Bermuda - 2016

Loading in 2 Seconds...

play fullscreen
1 / 10
eventtracker

Securing Bermuda businesses from the storm of cybersecurity threats - John Christly | Secure Bermuda - 2016 - PowerPoint PPT Presentation

110 Views
Download Presentation
Securing Bermuda businesses from the storm of cybersecurity threats - John Christly | Secure Bermuda - 2016
An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. John Christly is the Chief Information Security Officer for Netsurion, a leading provider of remotely-managed data and network security services for multi- location businesses. He is also a security blogger, threat researcher, and has participated in regional and national events as a speaker and panelist. He is an MSI Senior Fellow™ and has many years of experience in technical and cybersecurity management both domestically and internationally. He holds various certifications including the ISC2CISSP, Certified Fraud Examiner, AccessData Certified Examiner, PMP, HIPAA Security Specialist, Lean Six Sigma Master Black Belt, and is a Florida Licensed Private Investigator. His experience includes several industry regulations including HIPAA, HITECH, GLBA, FERPA, FCPA, FIPA, and PCI.

  2. The type of cybersecurity events being experienced today are very different from the threats of 20 years ago. There is no business or vertical that is immune to cyber threats. While the threats are great and varied, you can navigate this storm by being prepared.

  3. Brain, the first known MS- DOS computer virus, was released on the Internet by Herbert Zinn The “I Love You” virus was released causing $10 billion of damages and computer downtime 1988 2006 1987 2000 More than 130 million credit/debit card numbers were stolen from companies including TJX, Barnes & Nobles, and Office Max. UNIX virus infected 6,000 systems. That’s 1/3 of the computers at the time!

  4. Heartland Payment Systems had its computer network compromised which cost them 2.8 Billion Target’s breach cost $252 million and affected 70 million customers 2013 2016 2009 2015 As of 7/19/06, there have been 538 breaches across various verticals that have exposed 12,993,474 individuals, as tracked and reported by the Identity Theft Resource Center Target’s breach cost $252 million and affected 70 million customers

  5. We need to ensure that our systems are as locked down and secure as possible. That will take an effort to ensure that proper security is applied and maintained across all systems and applications. All businesses need to face the reality that it’s not a matter of “if” they will get breached, it’s simply a matter of “when” it will happen, and how bad it will be for their business and for their customers. The best offense is a good defense. In the cybersecurity world, it is possible to secure yourselves against many of the modern threats,

  6. In order to be prepared to the cybersecurity threats of today’s world, you must be prepared – you have to have the right tools on your tool belt. Anti-Virus Mobile Device Management Data Backup Cyber Insurance 2 Factor Authentication Patch Management Next Generation Firewall Data Loss Prevention Event Logging OS Lockdown Web Filter Wireless Security SIEM Role Based Access Control Strong Passwords

  7. Many of these tools require specialized skills to run, which may not be found easily. Specialists may not stay long as they are usually in high demand. The costs for some of these tools could be outside your ability to buy and maintain on your own budget. A vendor can license them at an MSP level and charge you less. Some of these tools require constant monitoring and attention. If you take your eyes off of the alerts for just a minute, you could be in trouble. If you decide to setup a Security Operations Center and monitor these tools on your own, be sure to empower your staff with the appropriate training, tools, and time to watch and respond to issues. Vendors can help. Security vendors have the expertise, the staff, and the resources to watch, engage, respond, and alert to issues that you may have otherwise missed. Don’t take on more than you can handle. There is plenty of help available from experienced vendors that do this daily for many customers like you.